/openbsd/usr.bin/ssh/ |
H A D | PROTOCOL.chacha20poly1305 | 2 encryption cipher supported by OpenSSH. 17 authenticated encryption mode. The construction used is based on that 19 data passed to the MAC and in the addition of encryption of the packet 25 The chacha20-poly1305@openssh.com offers both encryption and 60 for encryption of the packet payload. 87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
|
H A D | OVERVIEW | 35 - Ssh contains several encryption algorithms. These are all 48 RSA key generation, encryption, decryption 69 encryption routines. 139 negotiate encryption, then perform authentication, preparatory
|
H A D | PROTOCOL.key | 65 5. No encryption
|
/openbsd/sys/dev/pci/drm/amd/display/modules/hdcp/ |
H A D | hdcp1_transition.c | 81 } else if (!conn->is_repeater && input->encryption != PASS) { in mod_hdcp_hdcp1_transition() 131 input->encryption != PASS) { in mod_hdcp_hdcp1_transition() 229 } else if ((!conn->is_repeater && input->encryption != PASS) || in mod_hdcp_hdcp1_dp_transition() 308 } else if (input->encryption != PASS || in mod_hdcp_hdcp1_dp_transition()
|
H A D | hdcp1_execution.c | 236 &input->encryption, &status, in computations_validate_rx_test_for_repeater() 241 &input->encryption, &status, in computations_validate_rx_test_for_repeater() 362 if (input->encryption != PASS) in read_ksv_list() 364 &input->encryption, &status, in read_ksv_list()
|
H A D | hdcp.h | 51 uint8_t encryption; member
|
/openbsd/gnu/usr.bin/cvs/ |
H A D | configure.in | 334 dnl Use --with-encryption to turn on encryption support 336 AC_ARG_ENABLE(encryption, optenable 337 [ --enable-encryption enable encryption support], 339 yes) encryption=true ;; 340 no) encryption=false ;; 341 *) AC_MSG_ERROR(bad value ${enableval} for encryption option) ;; 343 [encryption=false]) 344 if test "$encryption" = "true"; then
|
H A D | cvs.spec.in | 57 control system with Kerberos authentication and encryption. 69 %configure --with-gssapi=/usr/kerberos --enable-encryption 149 - build with gssapi auth (--with-gssapi, --with-encryption)
|
H A D | cvs.spec | 57 control system with Kerberos authentication and encryption. 69 %configure --with-gssapi=/usr/kerberos --enable-encryption
|
H A D | configure | 4233 yes) encryption=true ;; 4234 no) encryption=false ;; 4238 encryption=false 4241 if test "$encryption" = "true"; then
|
H A D | config.h.in | 90 /* Define if you want encryption support. */
|
/openbsd/sbin/isakmpd/ |
H A D | QUESTIONS | 24 Main mode when using public key encryption authentication does not look 29 'Subsequent messages MUST use the last CBC encryption block from the previous
|
H A D | TO-DO | 53 * RSA encryption authentication. 112 * El-Gamal public key encryption.
|
H A D | ipsec_num.cst | 121 # IKE encryption algorithm.
|
/openbsd/regress/sbin/ipsecctl/ |
H A D | safail1.ok | 2 stdin: 6: no encryption or authentication with ipcomp
|
/openbsd/regress/usr.bin/openssl/ |
H A D | README | 1 testenc.sh tests encryption routines
|
/openbsd/lib/libcrypto/asn1/ |
H A D | p5_pbev2.c | 79 .offset = offsetof(PBE2PARAM, encryption), 208 scheme = pbe2->encryption; in PKCS5_pbe2_set()
|
/openbsd/lib/libcrypto/rc2/ |
H A D | rrc2.doc | 47 *encryption* algorithm, and a *decryption* algorithm. 123 The decryption operation is simply the inverse of the encryption operation. 214 A non-US based programmer who has never seen any encryption code before will 216 knowledge of any other encryption algorithms. Stand by.
|
/openbsd/lib/libssl/doc/ |
H A D | openssl.txt | 319 can be used for SGC ("step up" encryption) otherwise anyone could use it. 984 The parameters nid_key and nid_cert are the key and certificate encryption 985 algorithms, iter is the encryption iteration count, mac_iter is the MAC 1034 with lower encryption. Yes it's the dreaded crypto laws at work again which 1035 allow strong encryption on private keys and only weak encryption on other 1207 password" the encryption password is called the "privacy password" in the 1221 encryption is the same then there is no point in having a high iteration 1222 count for encryption if the MAC has no count. The MAC could be attacked 1226 This is the NID of the password based encryption method used. The following are 1237 algorithms. Typically you may be able to use any encryption on shrouded key [all …]
|
/openbsd/lib/libcrypto/evp/ |
H A D | evp_pbe.c | 449 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); in PKCS5_v2_PBE_keyivgen() 458 if (EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { in PKCS5_v2_PBE_keyivgen()
|
/openbsd/sys/conf/ |
H A D | GENERIC | 28 option UVM_SWAP_ENCRYPT# support encryption of pages going to swap
|
/openbsd/lib/libcrypto/x509/ |
H A D | x509_local.h | 394 X509_ALGOR *encryption; member
|
/openbsd/lib/libssl/test/ |
H A D | times | 5 They give an indication of the SSL protocol and encryption overheads.
|
/openbsd/etc/ |
H A D | protocols | 105 any 99 any # private encryption scheme
|
/openbsd/gnu/usr.bin/perl/pod/ |
H A D | perlfilter.pod | 207 how strong your encryption algorithm is, anyone determined enough can 269 decoding. (Rot13 is a very simple encryption scheme used in Usenet 560 The only stable usage for source filters are encryption, compression,
|